2026 Sponsors
2026 Strategic Sponsors

Abnormal Security is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected applications. The anomaly detection engine leverages identity and context to understand human behavior and analyze the risk of every cloud email event—detecting and stopping sophisticated, socially-engineered attacks that target the human vulnerability.
You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly. Additional protection will be available soon for Slack, Workday, Salesforce, ServiceNow, Zoom, Amazon Web Services and multiple other cloud applications.

Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions at akamai.com and akamai.com/blog, or follow Akamai Technologies on Twitter and LinkedIn.

BeyondTrust is the global identity security leader protecting Paths to Privilege™. Our identity-centric approach goes beyond securing privileges and access, empowering organizations with the most effective solution to manage the entire identity attack surface and neutralize threats, whether from external attacks or insiders.
BeyondTrust is leading the charge in transforming identity security to prevent breaches and limit the blast radius of attacks, while creating a superior customer experience and operational efficiencies. We are trusted by 20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners.
Learn more at www.beyondtrust.com.

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.
CrowdStrike: We stop breaches.
Learn more: https://www.crowdstrike.com/
Follow us: Blog | XTwitter | LinkedIn | Facebook | Instagram
Start a free trial today: https://www.crowdstrike.com/free-trial-guide/

Delinea is a pioneer in securing identities through centralised authorisation, making organisations more secure by seamlessly governing their interactions across the modern enterprise. Delinea allows organisations to apply context and intelligence throughout the identity lifecycle across cloud and traditional infrastructure, data, and SaaS applications to eliminate identity-related threats. With intelligent authorisation, Delinea provides the only platform that enables you to discover all identities, assign appropriate access levels, detect irregularities, and immediately respond to identity threats in real-time. Delinea accelerates your teams’ adoption by deploying in weeks, not months, and makes them more productive by requiring 90% fewer resources to manage than the nearest competitor. With a 99.995% uptime, the Delinea Platform is the most reliable identity security solution available.
Learn more about Delinea on https://delinea.com/, LinkedIn, X, and YouTube.

Information to come

Illumio is the leader in ransomware and breach containment, redefining how organisations contain cyberattacks and enable operational resilience. Powered by the Illumio AI Security Graph, our breach containment platform identifies and contains threats across hybrid multi-cloud environments – stopping the spread of attacks before they become disasters. Recognised as a Leader in the Forrester WaveTM for Microsegmentation, Illumio enables Zero Trust, strengthening cyber resilience for the infrastructure, systems, and organisations that keep the world running. www.illumio.com

Intruder's exposure management platform helps lean security teams stop breaches before they start by proactively uncovering attack surface weaknesses. By unifying attack surface management, cloud security, and continuous vulnerability management in one intuitive platform, Intruder makes it easy to secure your entire infrastructure — from apps and APIs to cloud accounts and employee devices. Designed to cut through the noise and complexity, Intruder makes it easy to discover exposed assets, detect misconfigs, prioritize real risks, streamline security workflows, stay compliant and mobilize teams to fix issues fast. Founded in 2015 by Chris Wallis, a former ethical hacker turned corporate blue teamer, Intruder was selected for GCHQ's Cyber Accelerator and is now protecting over 3,000 companies worldwide.
Learn more at intruder.io.

Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 80 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web. More information is available at www.proofpoint.com.
© Proofpoint, Inc. Proofpoint is a trademark of Proofpoint, Inc. in the United States and other countries. All other trademarks contained herein are property of their respective owners

Founded in Edinburgh in 2016, Quorum Cyber is one of the fastest-growing cyber security companies in the UK and North America with over 400 customers on four continents. Its mission is to help good people win and it does this by defending teams and organisations across the world and all industry sectors against the rising threat of cyber-attacks, enabling them to thrive in an increasingly hostile, unpredictable, and fast-changing digital landscape. Quorum Cyber is a Microsoft Solutions Partner for Security, a member of the Microsoft Intelligent Security Association (MISA), and the 2025 Microsoft Security MSSP of the Year. Find out more information here.

Searchlight Cyber provides organizations with relevant and actionable dark web intelligence to help them prevent cybercriminal activity. Founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research. Today we provide governments, law enforcement agencies, and enterprises around the world with dark web investigation and monitoring capabilities - empowering them in their fight against criminal activity on the dark web.

Thales is a global leader in cybersecurity, helping the most trusted organisations protect critical applications, data, identities, and software anywhere, at scale. Through Thales’ integrated platforms, customers achieve better visibility of risks, defend against cyber threats, close compliance gaps, and deliver trusted digital experiences for billions of consumers every day.

Stop Ransomware! ThreatLocker® improves enterprise-level server and endpoint security with Zero Trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management, and Detect EDR and MDR solutions.
2026 Education Seminar Sponsors

Trusted by over 180,000 businesses, millions of consumers, and 1 million developers, 1Password is redefining identity security for the way people and AI agents work today. Our mission is to unleash productivity without compromising security. The 1Password Extended Access Management product suite delivers zero trust security that protects, manages, and governs access to all SaaS applications, whether managed by IT or not. Built on 1Password’s Enterprise Password Manager, which secures more than 1.3 billion credentials, 1Password’s Agentic AI capabilities extend identity security to AI agents and other non-human identities. Leading companies such as Asana, Associated Press, Browserbase, Canva, Cresta, Golden State Warriors, Hugging Face, MongoDB, Octopus Energy, Salesforce, SandboxAQ, Slack, Stripe, and Under Armour trust 1Password to provide the right person or AI agent the right access to the right app from a trusted device.
Learn more at https://1password.com/

Contrast Security is the global leader in Application Detection and Response (ADR), empowering organisations to see and stop attacks on applications and APIs in real time. Contrast embeds patented threat sensors directly into the software, delivering unmatched visibility and protection. With continuous, real-time defence, Contrast uncovers hidden application layer risks that traditional solutions miss. Contrast’s powerful Runtime Security technology equips developers, AppSec teams and SecOps with one platform that proactively protects and defends applications and APIs against evolving threats.
For more information, please visit: www.contrastsecurity.com

CybSafe is the human risk management platform designed to reduce human cyber risk in the modern, remote, and hybrid work environment, by measuring and influencing specific security behaviors. CybSafe is powered by SebDB—the world’s most comprehensive security behaviors database—and built by the industry’s largest in-house team of psychologists, behavioral scientists, analysts, and security experts. An award-winning, fully scalable, and customisable solution, it’s the smart choice for any organisation.
- 91% Reduction in high-risk phishing behavior
- 55% Improvement in security behaviors
- 4x More likely to engage in cybersecurity initiatives

LayerX is an all-in-one, agentless security platform that protects enterprises against the most critical GenAI, SaaS, Web, Identity and Data Leakage risks and threats, without any impact on the user experience. The LayerX solution is deployed as a browser extension supporting all major browsers, meaning that organisations can easily deploy them without making any changes to networking or architecture, and does not interrupt user productivity or experience. Organisations use LayerX to secure their hybrid work environments, and keep track of data and identities in SaaS environments without losing speed or effectiveness. LayerX provides premium security benefits that goes beyond existing security tools, thus performing as a necessary middle-layer between the endpoint protection and the network security platforms. The LayerX enterprise-designed architecture enables seamless scalability as it doesn’t require agents or proxies and natively integrates with any browser. As a browser extension, LayerX delivers 100% coverage to any browser session, with no blind spots to its threat prevention, DLP, and secure access capabilities. In a similar manner, it ensures full visibility into every installed browser extension and into user activities.
LayerX risk applies its analysis and enforcement to every event within the browsing session, such as web page components and user activities, providing granular enforcement that disables malicious activity without obstructing user experience. This AI-based analysis takes place autonomously on the edge device with zero impact on network speed and no dependency on connectivity to a management server. Additionally, as part of the browser, LayerX extension is resilient to malware-based tampering or user modification. The ease of deployment and wide protection coverage make LayerX the ultimate choice to secure the browser and all the resources it accesses.

OneSpan is a global leader in securing identities, transactions, and digital interactions. With decades of expertise in authentication and fraud prevention, OneSpan empowers financial institutions, enterprises, and government organisations to build digital trust and protect against today’s most sophisticated cyber threats. OneSpan delivers advanced solutions that combine phishing-resistant authentication, transaction signing, mobile application security, and identity verification. Its portfolio includes DIGIPASS authenticators and the Mobile Security Suite, offering secure and user-friendly passwordless login, strong multi-factor authentication, and mobile app shielding against tampering and malware. These solutions are designed to comply with strict standards and regulations such as FIDO2, NIS2, and DORA, helping organizations strengthen resilience without compromising user experience. By securing the identity layer, OneSpan helps organizations outpace cybercriminals, safeguard critical assets, and build lasting trust in a digital-first world. Trusted by thousands of enterprises worldwide, including many of the world’s leading banks, OneSpan protects billions of digital interactions every year. Its cybersecurity technology not only prevents account takeovers and fraudulent transactions but also supports digital transformation initiatives by enabling secure, frictionless access for employees, partners, and customers.
Learn more at www.onespan.com

Varonis (Nasdaq: VRNS) is the leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. Thousands of organisations worldwide trust Varonis to defend their data wherever it lives — across SaaS, IaaS, and hybrid cloud environments. Customers use Varonis to automate a wide range of security outcomes, including data security posture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), AI security, identity protection, and insider risk management.
Varonis protects data first, not last. Learn more at www.varonis.com.
2026 Networking Sponsors

Information to come

Information to come